Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-12-2024 23:16
Static task
static1
Behavioral task
behavioral1
Sample
430010782.pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
430010782.pdf.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20241007-en
General
-
Target
430010782.pdf.exe
-
Size
759KB
-
MD5
74c8f736d425b1bd2027c2b5b144e188
-
SHA1
76f160d6c55611b99dcd10f85889957cb867990a
-
SHA256
293ebd610b0542289ffe9a52cab2c2a434dcff94918045a5ed1497deaee5eb87
-
SHA512
c859f5d689b168a72db6fc7fec5ed3c2a95cbd51402f0128b5370ec0cd41d73e02f90e3b27b85b8d76c5c0140bd9a6d9341d2422673baa52a5138ff689596162
-
SSDEEP
12288:0GCX77iIc2b3mMhkApKwjVim+PMpa3oGk6Rcs93tRLPHj6XOahG:qr75cY2vFikV/oGtR193tJPDUOr
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 3032 powershell.exe -
Loads dropped DLL 1 IoCs
pid Process 2384 430010782.pdf.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\devotee\Organosol.ini 430010782.pdf.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\resources\typhloalbuminuria\rekylgevrs.ini 430010782.pdf.exe File opened for modification C:\Windows\Fonts\ketoside.ref 430010782.pdf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 430010782.pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3032 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3032 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2384 wrote to memory of 3032 2384 430010782.pdf.exe 30 PID 2384 wrote to memory of 3032 2384 430010782.pdf.exe 30 PID 2384 wrote to memory of 3032 2384 430010782.pdf.exe 30 PID 2384 wrote to memory of 3032 2384 430010782.pdf.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\430010782.pdf.exe"C:\Users\Admin\AppData\Local\Temp\430010782.pdf.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden "$Ekstremumspunktet32=gc -raw 'C:\Users\Admin\AppData\Local\neoimpressionism\Arbejdsbesparelsernes40\Kbmand.Too';$byelaws=$Ekstremumspunktet32.SubString(71187,3);.$byelaws($Ekstremumspunktet32) "2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD501e76fe9d2033606a48d4816bd9c2d9d
SHA1e46d8a9ed4d5da220c81baf5f1fdb94708e9aba2
SHA256ee052fd5141bf769b841846170aabf0d7c2bb922c74c623c3f109344534f7a70
SHA51262ef7095d1bf53354c20329c2ce8546c277aa0e791839c8a24108a01f9483a953979259e0ad04dbcab966444ee7cdd340f8c9557bc8f98e9400794f2751dc7e0